"This is an interdisciplinary program, exclusively designed for mid-to-senior professionals holding or aspiring for leadership positions," says Dena Haritos Tsamitis, director of education, training and outreach for Carnegie Mellon's CyLab. "This is an opportunity for them to learn from experience and expertise of 20 or so peers who are all seasoned practitioners in their field."

This degree program is structured for full-time working practitioners and follows a low residency model, which means over an entire 20-month period of five semesters, the program requires just 24 days of residency at the school.

CMU, based in Pittsburgh, Penn., is a recognized national center of academic excellence in information assurance education.

Focus on Forensics, Resilience

The ExecMSIA offers a concentration in cyber forensics and incident response, or resilience management. Students can specialize in one or the other. An option is also available for non-degree students to pursue certificates in these two areas.

The cyber forensics and incident response ExecMSIA offers technical executives with the knowledge, skills sets and experiences to successfully plan for and manage the inevitabilities of cyber attack. This concentration is ideally suited for experienced technical professionals currently in or pursuing leadership roles, such as chief technical officer, chief security officer and chief information security officer.

Resilience management explores how effective risk management translates into the emerging properties of operational resiliency. This essentially brings business continuity and risk management into a converging framework and is geared toward aspiring professionals in leadership roles, such as chief compliance officer, chief operations officer and chief information officer.

Students do not need to have an existing background in forensics, incident response or business continuity to specialize in these areas. The program however, requires a minimum of five years professional working experience within the IT or IT security field.

Program Overview

The program is structured to run 20 months, made up of five semesters. In each semester, students take 24 units made up of two core courses during the first semester, and a combination of core and concentration courses in the remaining semesters.

Training is delivered in an executive format that combines online sessions with periodic, short campus sessions. This includes laboratory exercises, mock hearings, group meetings, case study discussions, presentations and problem-driven scenarios.

"It is not like sitting in a lecture hall with 500 other students," Tsamitis says. "Students get a comprehensive grasp, applied knowledge and hands-on understanding of concepts, as opposed to high-level overview on these areas."

The faculty includes senior members from CyLab, Temple University of Business, Software Engineering Institute and The Computer Emergency Response Team.

"This program is tailored to meet the specific needs of senior-level folks who make strategic decisions within their organizations." Tsamitis says. "This is a journey for them to explore, apply and integrate the learning in business and technical aspects into their work environments."

International candidates are eligible to apply. The program application deadlines are April 30, 2012 (first round) and June 30, 2012 (second round). For details on how to apply visit: The ExecMSIA page.

Carnegie Mellon University also offers IT security practitioners with a master's degree in information security technology and management, as well as other information technology undergraduate and graduate programs that focus on mobility, information security and software management.

The ExecMSIA offered by Carnegie Mellon University is a program resulting from extensive market research and inquiries from senior-level practitioners who are looking to pursue a practical degree to be better prepared in facing today's fast-paced technological and business challenges.

"This is a truly unique program that fits the specific needs for upcoming and current IT security leaders and adds high enrichment to peer support and the learning experience," Tsamitis says.

About the Author

Upasana Gupta oversees CareersInfoSecurity and shepherds career and leadership coverage for all Information Security Media Group's media properties. She regularly writes on career topics and speaks to senior executives on a wide-range of subjects, including security leadership, privacy, risk management, application security and fraud. She also helps produce podcasts and is instrumental in the global expansion of ISMG websites by recruiting international information security and risk experts to contribute content, including blogs. Upasana previously served as a resource manager focusing on hiring, recruiting and human resources at Icons Inc., an IT security advisory firm affiliated with ISMG. She holds an MBA in human resources from Maharishi University of Management, Fairfield, Iowa.

Operation Success!

Risk Management Framework: Learn from NIST

From heightened risks to increased regulations, senior leaders at all levels are pressured to
improve their organizations' risk management capabilities. But no one is showing them how -
until now.

Learn the fundamentals of developing a risk management program from the man who wrote the book
on the topic: Ron Ross, computer scientist for the National Institute of Standards and
Technology. In an exclusive presentation, Ross, lead author of NIST Special Publication 800-37
- the bible of risk assessment and management - will share his unique insights on how to:

Understand the current cyber threats to all public and private sector organizations;

Develop a multi-tiered risk management approach built upon governance, processes and
information systems;

Enter your email address to reset your password

Already have anISMG account?

Forgot Your Password Message:

Contact Us

Already have anISMG account?

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.